但一次又一次,在涉密网络和公共网络之间的这个“空气间隙”被桥接上,其中很大一部分是通过使用光盘和可移动存储设备。
But time and time again, the so-called "air gaps" between classified and public networks have been bridged, largely through the use of discs and removable drives.
所以,下次当您打算进行线上涉密交易时,记得花点时间查看一下网页的安全信息。
Sothe next time you’re about to perform a sensitive transaction, take a moment tokeep a look out for the website’s security information.
让我们来看看一个对飞行器进行静力测试的一个涉密车间,这些测试是为了保证飞机在大载荷飞行状态下机体不破坏。
Let's visit a workshop with restricted access where static load tests of aviation equipment used to be performed. The tests ensured that the plane wouldn't be broken in the air due to heavy loads.
因而,涉密计算机必须拆除具有无线联网功能的硬件模块。
Therefore, must remove the secret computer hardware module with wireless Internet function.
涉密单位还要尽量购买保密性能好的打印机和传真机等设备。
The classified units will also try to buy the good performance of the confidential printer and fax machine.
涉密人员的合法权益受法律保护。
The legitimate rights and interests of secret-related personnel shall be protected by law.
WSSNS从物理安全、系统安全、网络安全、应用安全和管理安全五个方面来实现涉密网的安全保护。
WSSNS realized the protection of secret - related network from five aspects: physics safety, system safety, network safety, application safety and management safety.
该方案对服务器系统安全有所加强,所占用的主机资源和网络资源较少,适用于针对涉密网等高安全级别的可信系统中。
The prototype system shows the project reinforces security of host system, and the resource usages is less, and it is applicable in secret network.
本文的研究成果已在某省级新闻网站和某涉密办公网络中得到应用,对于提高它们的整体安全防护能力起到了积极的作用。
This prototype has already been applied to a provincial news website and an office network concerning national-security, and has greatly improved their security defense ability.
信息安全是电子政务建设必须解决的关键问题,在依托互联网的非涉密内部办公网建设中,该矛盾更加突出。
Informaton security is a key problem for the construction of e-government, and is very important for the development of non-secret-involved internal office network based on Internet.
涉密内容的录音带、录像带要妥善保管,在使用播放前需经领导同意并严格控制收听收看范围。
These secret audio and video recordings must be securely kept. The play of these materials has to be authorized by the leaders and the extension of the audience is strictly controlled.
本文根据多年网络信息系统安全管理的实践经验,分析了目前网络攻击入侵手段,详细论述了构建涉密计算机信息系统安全体系的基本思路。
Based on many years' experience of network management the author, analyzes the common methods of network invasion and offers advice on security frameworks for management of secret computer.
使用非涉密计算机、非涉密存储设备存储、处理国家秘密信息的;
Storing or processing state secret information by using any computer or storage device which is not a secret-related computer or storage device;
一极是涉密部门防御策略的软件化,另一极是存储设备生产厂商防御策略的硬件化。
One pole is defense strategy software trend of the secret department, the other pole is defense strategy hardware trend of the storage device manufacturers.
将未经安全技术处理的退出使用的涉密计算机、涉密存储设备赠送、出售、丢弃或者改作其他用途的。
Presenting, selling, abandoning or using for any other purpose any secret-related computer or storage device which has ceased to be used but not undergone treatment by security techniques.
改进了涉密检查程序节省内存资源的程序实现方法,研究避免两次检查间未改动文件的重复检查方法,这些方法将大大提高涉密检查的效率。
The methods of economizing resources of memory and avoiding repeating the inspection of unchanged documents are studied in order to raise the effect of Inspecting secret information in the Intranet.
应用前文提出的搜索引擎模型,本文实现了一个校园保密检查原型系统,对终端主机中保存的可能涉密信息保密检查。
Use the model proposed, we design and implement a campus confidential inspection system, to check the confidential information on the end hosts.
信息安全风险评估是保证信息系统安全保密的重要手段,是涉密信息系统风险管理的重要内容。
Information security risk assessment is an effective way to protect the security of secret-involved information system.
信息安全风险评估是保证信息系统安全保密的重要手段,是涉密信息系统风险管理的重要内容。
Information security risk assessment is an effective way to protect the security of secret-involved information system.
应用推荐